EP1165911A1 - Elektronisches schloss, das lernen kann, jeden gewöhnlichen schlüssel wiederzuerkennen - Google Patents
Elektronisches schloss, das lernen kann, jeden gewöhnlichen schlüssel wiederzuerkennenInfo
- Publication number
- EP1165911A1 EP1165911A1 EP00921722A EP00921722A EP1165911A1 EP 1165911 A1 EP1165911 A1 EP 1165911A1 EP 00921722 A EP00921722 A EP 00921722A EP 00921722 A EP00921722 A EP 00921722A EP 1165911 A1 EP1165911 A1 EP 1165911A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- shape
- lock
- keyway
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
- E05B49/002—Keys with mechanical characteristics, e.g. notches, perforations, opaque marks
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/0001—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
- E05B47/0009—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with thermo-electric actuators, e.g. heated bimetals
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00849—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed programming by learning
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
- G07C2009/00992—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier mechanical key
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00944—Details of construction or manufacture
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
- Y10T70/7073—Including use of a key
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
- Y10T70/7073—Including use of a key
- Y10T70/7079—Key rotated [e.g., Eurocylinder]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7136—Key initiated actuation of device
Definitions
- This invention relates to locking devices, and more specifically to electronic sensing of physical key patterns, electronic latching, and general configurations for electronic locks.
- Access control devices that involve physical tokens carried by the persons who may wish to gain access, fall into two categories.
- Temporary users may not return keys issued them, such as with keys for hotels and rental cars.
- FIG. 1 shows a combination functional and detailed block diagram of an electronic lock in accordance with the teachings of the present invention.
- FIG. 2 shows a combination functional and detailed block diagram of an electronic lock partitioned between a rotatable part and a fixed part in accordance with the teachings of the present invention.
- FIG. 3a and 3b show a combination functional and sectional view, the two views being perpendicular to each other, of an integrated electronic lock in accordance with the teachings of the present invention.
- FIG. 4a-d shows sections of spring-driven cams cooperating in the lock of Fig 3, all in accordance with the teachings of the present invention
- FIG. 5a-d shows sectional views of a lever arm and plate actuator mechanism in various states of operations in accordance with the teachings of the present invention.
- FIG. 6 shows a cutaway and sectional projections from the upper front corner of an electronic lock in accordance with the teachings of the present invention.
- FIG. 7a and 7b each show a sectional cutaway view from the front of the lock of Fig 6 in different use configurations, without and with a key, respectively, all in accordance with the teachings of the present invention.
- FIG. 8a and 8b each show a sectional cutaway view from the side of the lock of Fig 6 in different use configurations with a key, all in accordance with the teachings of the present invention.
- FIG. 9 shows a detail projection of some of the components of the lock of Fig 6 with a key, in accordance with the teachings of the present invention.
- FIG. 10 shows a detail and relatively enlarged projection of some of the sensor and electronic mounting components of the lock of Fig 6, in accordance with the teachings of the present invention.
- FIG. 11 a c shows sections of a capacitive sensor array and holding brake mechanism, where 11a is perpendicular to the keyway from the front, 11 b is through the keyway from the top, and 11 c is in the plane of the circuit board, all in accordance with the teachings of the present invention.
- FIG. 12a-c show alternate configurations in plan view of capacitive sensor arrays for the lock of Fig 11, all in accordance with the teachings of the present invention.
- FIG. 13a-c shows the same sectional view of an actuator mechanism in various configurations of use, in accordance with the teachings of the present invention.
- FIG. 14 shows a sectional view parallel with and through the keyway of an exemplary embodiment with two styluses in accordance with the teachings of the present invention.
- FIG. 15a shows a section perpendicular to the keyway and through a sliding plate of special shape and using a cantilever sensor in accordance with the teachings of the present invention.
- FIG. 15b shows a detail plan view of a cantilever sensor from Fig 15a, in accordance with the teachings of the present invention.
- FIG. 16a-c shows sections of an inductive sensor array, where 11 a is perpendicular to the keyway from the front, 11b is through the keyway from the top, and 11c is in the plane through the keyway form the side, all in accordance with the teachings of the present invention.
- FIG. 17a-c shows sections of an alternate inductive sensor, where 11 a is perpendicular to the keyway from the front, 11b is through the keyway from the top, and 11c is in the plane through the keyway form the side, all in accordance with the teachings ot the present invention.
- FIG. 1 ⁇ a-b shows combination functional and sectional views of two use configurations of an exemplary actuator and latching mechanism in accordance with the teachings of the present invention
- FIG. 19 shows a sectional view perpendicular to the keyway from the front of an exemplary optical sensor system in accordance with the teachings of the present invention.
- a lock that can be operated with a wide variety of existing metal keys. To be able to do this, it senses the key "bitting" profile (the part that encodes the secret key information) as the key is inserted into the lock. Before allowing unlocking, it must successfully match the profile pattern with one in its database of allowed key templates. The actual physical unlocking is by means of a miniature electromechanical actuator whose effect is amplified and strengthened by some preliminary rotation of the lock. Two types of exemplary embodiments are described, one with the electronic parts located outside the rotating plug and the other where they are contained wholly within it. Extensions allow the lock to learn new keys, read a key-blank series code in addition to the bitting pattern, protect itself in case of attack, securely get its battery changed, be operated like a combination lock, and communicate with external devices or the person operating it.
- bitting the part that encodes the secret key information
- Sensing the key bitting profile mechanically includes elements that are free to move perpendicular to the direction of insertion of the key into the "keyway" slot. These mechanical sensing members are urged by a spring toward the key bitting and track or follow along its profile as the key is inserted.
- the part of the sensing member that comes into contact with the key is a small stainless steel ball (about 1/8 inches in diameter), that is constrained to travel in a radial drill hole in the plug, but is free to rotate, and thus moves smoothly over the key surface.
- the other part of the mechanical sensing member is a stainless steel plate constrained to move perpendicularly to the key axis and in a plane perpendicular to that axis.
- the plate includes wiper arms that are electrically connected.
- the key profile can also be sensed by other mechanical or electromechanical means, such as capacitive, inductive, optical, or acoustic.
- the key bitting pattern in its contmuos analog Kunststoffage form is converted to a digital form by, for instance, being sampled.
- the result is a series of bitting height values, spaced over time.
- Existing metal keys are believed to have five to seven evenly-spaced pin height locations, each taking on between four and ten different values. (The remainder of the pattern is simply ramping that permits the key to be inserted and withdrawn, and because too sharp an angle does not work well, actually means that certain extreme transitions between adjacent heights are not used.)
- the quantization of the key information has to be adequate to recognize this pattern of heights.
- the number of samples per second must be adequate to accommodate the fastest insertion speed anticipated, believed to be roughly 50 milliseconds, which suggest a sample be taken every millisecond or so.
- the pattern matching algorithm transforms the sampled waveform acquired into a feature set. Preprocessing isolates the bitting segment from the pre and post parts and attempts to correct for any physical key skew it can detect. Then the pattern is normalized to a standard length, involving linear inter-sample interpolation. Features are extracted, ignoring systematic differences, such as that a more rapid key insertion tends to have more "bounce" in a mechanical sensor, which produces a slightly different pattern shape. Such feature sets can then simply be compared to templates based on previous pattern sets. There is a match if the differences are systematic and within tolerances, as is well known in the pattern matching art.
- the physical unlocking is allowed when an appropriate key match is detected and logic circuits then provide electrical energy to allow unlocking.
- Most of the energy for the unlocking is provided by the person operating the lock, who turns the key through a preliminary angle, during which elements are configured to either prevent further rotation, or to allow it and consequently full unlocking.
- a solenoid can be energized to move an obstructing plunger, which would otherwise block a stainless steel ball straddling the plug/body shear line from being able to be cammed out of the shear line and permitting complete rotation of the plug.
- Some other actuators unlatch by energizing a holding magnet while elements are moved so that a particular configuration is achieved, thereby allowing unlatching.
- All three major silicon parts could be on a single chip: (a) sensors that detect the motion of the pin riding on the key profile; (b) standard control parts, such as analog to digital converter, lock logic and rule bases; and (c) ail non- purel ⁇ mechanical parts of the locking actuator.
- the spring-loaded element that tracks the key profile is coupled to a magnet. As it moves up and down, its magnetic field moves along a detector on part of the chip which is mounted in a plane parallel or perpendicular with the line of the magnet's motion. This yields a time-varying signal proportional to the height of the magnet and the key profile it is following.
- the distance from stationary plates to key metal is measured directly by measuring small changes in capacitance. Such plates can measure the key as it is inserted, also yielding time-varying height readings, or an array of them can measure its shape while stationary after insertion, in another alternate embodiment, it is measured by changes in AC inductance.
- micro cantilevers When the actuator is in the locked state, micro cantilevers protrude from the surface of their part of the chip, into mating cavities in a plate pressed against the chip surface or a another silicon structure integrated in a way that it can slide within the first.
- the mating of the cantilevers into the cavities prevents the plate from being able to slide in at least one direction over the surface of the chip, as it essentially tries to shear each cantilever off by compressing it towards its attached end.
- the plate is freed to slide by the pulling of the micro-structures back behind the front surface of the chip.
- This pulling back motion can be caused, for instance, by electrostatic force between the overhang and the base it hangs over, by piezoelectric effects induced in layers of the cantilevers, or by electrically heating cantilevers laminated of materials with different coefficients of expansion or shape memory alloy.
- the plate slides responsive to a spring pressure applied to it, and thereby brings its own series of parallel slots into alignment with blades that become spring biased to penetrate through it and substantially further.
- the single solid base of the blades is then moved out of the way of a conventional sidebar, which cams into the plug as it is further rotated.
- a small stainless steel ball is cammed into the plug, which induces the first force.
- a second ball is cammed in that induces the second force.
- the sidebar attempts to penetrate the recess left by the blade base when the blades have successfully penetrated the plate.
- the sidebar is retracted first, then the ball that moves the blade base enters its recess in the body, and thus the blades are pulled out of the slots first by their counter spring. After this, the ball that pushed the plate is moved into its recess in the body, and this lets the plate's counter spring push it back to its locked position.
- some embodiments split and/or duplicate functions between the rotating part, the fixed part, and any remote part.
- New keys can be learned by the lock simply developing a template for them and recording this in its memory. It might be done, for instance, when a currently valid or special key is used just before or after the new key.
- the lock can be configured to read a key blank series code in addition to the normal bitting. For instance, this can be achieved without additional sensors, simply by creating a pattern of extra shapes of the bitting part of key blanks read by a specially formed stylus or by inclusions of material read by material specific sensors.
- the lock knows when invalid keys are inserted. Attempts to try many keys to find a valid one will thus be recognized and the lock can then delay its operation for a fixed amount of time, say, three minutes. The time period and other parameters can also be adjusted if the attacks continue.
- Any unauthorized key could be used to enter a PIN code. For instance, code 7294 would be entered by trying to turn seven times to the right, then two to the left, nine right, and four left. Once the lock recognizes the code, the key can be used to throw the bolt and gain entry or to allow changing the lock's memory.
- the lock can communicate with the outside world. It can talk with the user by lights or sounds to indicate various states. It might also simply not unlock the first time, such as to indicate that the battery is low and needs replacing.
- the lock could communicate with other equipment via galvanic electrical contacts or through so-called “contactless” infra-red or radio frequency (many of which could supply power in case of battery failure). It could communicate with a building access control system or other network, for instance, or with various portable electronic devices.
- controller will be used to refer the mecha ⁇ sm(s) that realize the logical functions described below.
- the controller has a stored set of keys and certain "rules" related to them.
- the lock may not be able to meaningfully unlock (and will be said to not be “ready") in certain circumstances, such as for example, when it is in an unlocked position, when unlocking has been "blocked” (as defined elsewhere), or possibly when in the middle of certain "multi-key” operations.
- keys There may be one or more keys whose rules allow them to work "directly,” in that when the lock is ready, and the key is recognized, the lock is able to be opened.
- Other keys may be treated substantially as direct, but subject to restrictions, including for example: keys that can only be used to unlock the lock a fixed number of times (such as “one-time” keys or “two-time” use, called “count-restricted” keys); keys subject to restrictions on the time of day and/or day of week, etc. called “time-restricted” (implying the inclusion of a real time clock, which may also allow operating with any key during preset hours); or the same key may be required to be recognized multiple times, and possibly separated by time intervals in a range determined by the rule.
- Rules may involve more than one key. Two different keys may be required to be recognized within a limited time interval, implementing so called “two-man rule” or safe-deposit box type applications. More than two keys could be required, and the order in which they are inserted might or might not be restricted.
- Another example of multi-key rules requires a special key, the "guard” key, to be inserted to make certain other keys operable, and then when the guard key is inserted again, those keys are not allowed until the guard key is inserted yet again. Naturally, this could be extended to a "guard-day” key that would enable unlocking and a "guard night” key that would disable it.
- keys may be used simply to create logging, such as for the familiar time-clock or watchman type of functions.
- a security mechanism should guard potentially confidential information against all known credible attacks.
- the amount of time, the amount of power, or the emanations from the process of making this decision should preferably not leak information.
- One kind of information is the well known degree of partial correctness of a key, such as would be revealed when the checking is aborted during the sequence of feature checking at the first feature that does not match. Others kinds of partial information might be that certain keys are in the rule base or that certain types of rules are present. Timing, power- consumption, and/or emulations should be constant or at least not readily reveal such information.
- rule base is changed. It might then, for instance: not allow any further unlocking; require two-man rule; disable some keys in combination with possibly enabling special other keys; or change the matching criteria. Such changes in rule base could then be reversed or otherwise compensated for, once the appropriate key(s) are used.
- a new lock could have certain keys programmed at the factory, that could then be used by the end user in certain circumstances. For instance, the code could be communicated by the user and/or the manufacturer to someone who needs to gain access but where transfer of a physical key is less desirable. This could be in an emergency situation, or when something unexpected happens, such as the owner gets locked out or a sudden visit or urgent repair.
- Another example is retrofit of existing locks, where the physical keys used for them have known "key codes" and these can be associated with the particular lock locations, all or partly at the factory, field office, and/or lock site.
- a lock might add a new key to the rule base if the new key is inserted within a short time after a currently valid key, or possibly sandwiched in between successive applications of the currently valid key.
- the ability of keys in the rule base to allow this, and the resulting rules and algorithms for the new keys and possibly other changes to the rule base are also possible. For instance, there might only be one valid key at a time, and introducing a new key would enable it fuliy and lock out the old key completely.
- Another boundary case is that the only change in the rule base is to add the new key in with the same rules as the old key.
- the authorizing key is only a one-time or otherwise count restricted key. The authorized key may be time-restricted and its authorization may last only until any other authorization with a different authorization key.
- An illustrative example application is a hotel.
- a guest Upon check-in, a guest receives a one-time-use temporary key. Then the guest can use the one time key to authorize his/her own, say, car or home key, and discard the then useless one-time key. If the guest will not be using his/her own key, then a different temporary key with time restrictions but no new-key capability could be issued. Or the temporary Key could be allowed to either operate as the key or to introduce a new key at any point, all within the time or next guest restrictions. There might also be housekeeping keys (possibly part of a master key hierarchy or other structure) that lock guests out during cleaning.
- the hotel wishes to introduce a restriction on the number of simultaneously useable keys, then this could be enforced by the rule for the number of keys enabled, possibly counting the use of the temporary key if it is allowed and/or used. Special keys could be issued for one-time use if the guest has left his/her key in the room. Or a key might disable the room temporarily, because the guest credit line has been used up. Or the room might be put in a cleaned and ready state, after which only the new guest(s) could enter.
- keys may be drawn from a basket of keys at the front desk and given to new guests, who can then open any ready room. To prevent a guest, or someone who obtains the guest's discarded key, from using it to enter other ready rooms, these keys should be blacklisted from being allowed to open rooms subsequently left ready.
- the keys that can be put on the list that opens ready rooms can be read each evening from inventory and placed in the basket for use that day or different color key groups can be used each day.
- the lock is able to communicate with an outside entity, then that entity might supply new keys or rule changes to the lock. If the rule base or unlock decisions are made remotely, then much of the forgoing could be applied and/or simplified. But other input could also cause changes in the key and/or rule base. For instance, the guest could insert the key at check-in and thus obviate the need for a temporary key. When someone must be crossed off the list, this could be done from the central site.
- All of the forgoing might be influenced by another type of input, related to physical operatio ⁇ /position/condition of the lock and/or associated apparatus.
- Some sort of sensor is believed to be needed for this.
- the lock might sense things such as its angle of physical rotation by the key or the rotational and/or torque inputting of a PIN code. A torque could indicate someone trying to operate the lock.
- Sensor input might also provide indication of whether a door, for instance, is open or closed.
- Emergency situations such as rapidly-rising, or simply high, temperature might be a basis for unlocking. Presence of a key might also be required to prevent defensive measures.
- Example uses include only being able to add new keys when the lock is in a certain rotational position, or simply in the unlocked state. Or there might be a sequence of states required to interact with the key(s) used to authorize and the new key(s). For instance, the old key might have to be used to unlock the lock, and the new key inserted shortly thereafter, when the lock is in the unlocked position. LOGGING
- a control unit could keep a log of events that have happened. Everything that might be of later interest could be recorded and only discarded as the storage needs to be re-claimed for other uses. What is recorded might also be more selective, such as only certain keys, or uses within certain times, and/or only certain types of events, such as false attempts, rule changes, log reading, etc.
- the algorithm for purging or recycling storage might have priority or summary data last longer than some details and might also enforce time limits on the maintenance of some data.
- logging information is revealed by the lock, and what information is revealed, could be the subject of a logging rule base.
- certain keys such as a guard key
- Privacy and/or "fifth amendment" type of considerations may require that logging, if kept on certain keys, can only be accessed with those keys, and/or possibly under some onerous combinations of other keys.
- it could implement all the familiar access control and query restriction types of provisions known in the computer art. Such restrictions could also include presence of physical keys.
- This section addresses the electro-mechanical aspects of the preferred embodiments.
- it comprises several aspects: sensor and actuator transducers, input and output with the operator, communication with electronic keys, and the storage as well as possible generation of power.
- SENSOR TECHNOLOGY SENSOR TECHNOLOGY
- recognition techniques can be applied, separately or in combination. For instance, certain properties of the metal that coins are made from are read using known techniques by coin mechanisms typically used in vending machines.
- the so-called “profile” of the key which mates with the broached shape or “warding" visible on the front of most locks is another possibility. It could, for instance, be measured by known electronic ranging techniques, or by feelers.
- a signature could be taken from the physical key by introducing energy into it and measuring its resonance's and/or various time domain characteristics. The reflective visible color or image of the key could also be read.
- One embodiment “dynamic,” measures the “bitting” pattern of the key, the cut edge visible from the side, as it is inserted into the lock and/or withdrawn.
- An alternative “static” embodiment uses sensors to read the bitting pattern directly, once the key is fully inserted.
- Various sensor technologies can be used for each approach, such as by use of a digital camera, array of light/infra-red sources and/or sensors, the reflection patterns of other energy directed at the key, other metal detection sensor techniques, or any other sensor technology that may already be or become known in the art.
- plural sensors may have advantages.
- two active styluses are used, yielding additional information or facilitating measurement.
- More than two sensors, such as three or four, may provide additional information and/or redundancy useful in canceling the effects of noise, single sensor failures, etc.
- a sensor measuring axial insertion depth of the key allows the timing of samples to be normalized to correspond to equal increments of insertion.
- a passive array of sensors is exemplified by a capacitive distance sensors, to be shown in more detail, that measure the distance to various points along the bitting pattern of the key after it is fully inserted.
- velocity or acceleration or position change sensors could also be adapted instead or sensors that read position or distance directly.
- the actuator function merely translates electrical or whatever logical signal into the ability of mechanical motion, and any suitable means or method for accomplishing this may be called an "actuator" here.
- This can be realized in a variety of ways, three of which are given as examples in preferred embodiments and two of these are elaborated on here. First some alternate example approaches are highlighted.
- Piezoelectric elements can act as a brake that is released only when the appropriate electrical signal is applied.
- Another approach allows a very small permanent magnet on needle bearings to be rotated, if it is not, the sidebar via a spring cams an element that must shear it to move further, which element in turn allows further motion of the sidebar.
- a way to obtain this is to give the torque a very low mechanical advantage over a self moving latch, such as motor or solenoid, and provide a slip by clutch in case of over-torque (but ensure that overtorquing does not allow unlocking).
- a miniature dc motor like in at least some small electronic watches, would be the self-moving part.
- the mechanical advantage could be provided by in effect turning the hands of a watch or moving the end of a series of levers, in which the short parts drive the long parts.
- a holding magnet that is pulled away from a magnetic element by the initial rotation: if it is energized during this period, it brings the elements with it, otherwise not. It is believed that a holding magnet can result in a more efficient latch than a motor or solenoid. Plural elements are used, each of which is designed to go with the holding magnet or with the separating force. This means that a random shock is unlikely to put the elements in the right places.
- a potential problem is that the plate may stop some protruding cantilevers from being able to retract, by "jamming" its business end against the cantilever's free end.
- One way to reduce this is simply by shaping the cantilever ends or plate surfaces with a little relief, so that if the lever can get past the plate in a given position, then it will not be in contact with it further.
- An approach that is believed preferable is for the plate to move a small distance in the opposite direction during unlocking. In other words, the plate moves a smail distance in the direction from the attached ends to the free ends, while the force is being applied to retract the cantilevers just before plate is attempted to be moved its full distance in the direction from the free ends to the attached ends. It is believed this solves the problem, since any jammed cantilever will be released while the retraction force is applied.
- Power could be saved if the cantilevers can be returned to the locked state immediately after the plate has slid over them. It is believed possible for the plate to push them back in during locking simply because its edges traverse each cantilever from its attached end to its free end, instead of from the free end toward the attached ends, as in unlocking. Power consumption could be further reduced substantially if motion or position sensors, potentially also integrated in the silicon, detect movement of the plate or those elements that will move it, in time to retract the cantilevers before the business edges of the micro cavities have a chance to actually engage them. This could even be by the cantilevers themselves.
- the number of levels of indirection from the micro-actuator mechanism itself, in this embodiment the cantilever and plate, to the actual outside world force applied through the keyway, can be varied. At zero, there are no intervening elements, and the plate would directly be cammed by the lock body. With a single level, exactly one additional element tests the plate. Two levels are described in the preferred embodiment for the micro- actuator. As would be readily appreciated by someone skilled in the mechanical design art, any number of levels of indirection could be applied to any of the example mechanisms described here, without departing from the spirit and scope of the present invention. HOW IT TALKS WITH YOU
- the lock may be desired for the lock to communicate with the person operating it, the communication being either in one or the other direction, or possibly in both. First communication from the lock to the person is considered.
- One way for the lock to communicate with the person holding a valid key is simply to not unlock each time. For instance, the lock might only unlock every other time the key is used. Or it might only unlock if the key is inserted, withdrawn, and re-inserted in rapid succession. More generally, any sort of rules could be enforced that make the lock not open some times and thereby reveal that at least one such rule, if not exactly which rule, is enforced. Example uses of this approach would be that when the lock is running low on battery power this behavior starts, and gets worse as power diminishes. Another would be to indicate some property of the log base, such as that some sort of attack has been detected or that a change in the rule base has occurred. A variation on this approach might be that the lock holds the key inside longer than it would normally, in those embodiments so equipped.
- a wholly different approach for the lock to communicate to the outside world would be by making a noise or vibration. Another would be to display something on an LED or LCD or other type of electronic indicator or display means.
- the user could communicate to the lock either through a mechanical key or by general mechanical, audible, or visual means.
- special keys might send special messages to the lock. Their might be buttons, the user might be able to speak to the lock (as silicon technology advances), and the lock might even have a look at the person.
- the audio or video person recognition might be used in place of or to augment the authentication provided by the physical key.
- the lock could be configured to communicate with another device for auxiliary functions.
- auxiliary functions One example is a dry contact provided that activates a door announcer, lighting, or access control system.
- the lock could communicate with and/or control any sort of portable and/or fixed external system, such as might be used to control functions in a building, communicate with persons, facilitate external monitoring and/or record-keeping. Examples include personal digital assistants, cellular telephones, ets. POWER SOURCE(S)
- the control unit and sensors and actuator it is believed with today's technology need a source of electrical power.
- a rechargeable battery or capacitor could be re-charged as far as possible whenever connected to an external device or when power is generated.
- shorter term storage of power could be used, such as capacitors, from one opening to the next, or to accumulate power fed in gradually such as from a solar cell.
- the lock could generate power in a variety of ways.
- so called “LVT” magnetic sensors are said to be “self-powering” and generate power that could, it is believed, be used to some advantage.
- axial mechanical forces from key insertion could be used.
- Another approach would generate power from the rotary motion induced by the key being turned in normal locking and unlocking.
- Well known rotary generators could be employed for this purpose. Solar power generation is know and used today. Other general approaches, such as due to thermal or electromagnetic energy fluctuations might become practical in future.
- the lock could be made to be self-powered, not requiring any battery or external power. It could simply be made to try to keep its rechargeable battery adequately charged in normal operation. It could just accumulate a power reserve in case it should become disconnected from its remote site, and to reduce the instantaneous power requirements from the remote site. Another approach would be to say that when the battery has failed, the lock can still be operated, although it might take extra effort. One might have to insert and withdraw the key rapidly a number of times. This might overcome the lack of confidence in battery power that it is believed consumers may have to some extent, without requiring too efficient of a generator and power consumption.
- Switched off is by means of an electrical circuit that is essentially open when no key is present and that is closed by the presence of a key.
- An example embodiment is simply an electro-mechanical switch that is tripped when the key is inserted and powers the whole device. Mechanical motion from the key could be transferred from the plug to the body, so that no power would need be transferred to the key in this embodiment.
- Another type of switch would use the key as a conductor to connect two otherwise isolated contacts. An example of this would be two contacts that are urged in from the sides of the keyway towards its center but without touching. When a key is inserted, the two would be connected electrically and a latching circuit might be activated, and the two contacts could be pushed out of the way of the key against the springs just mentioned.
- circuitry may be capable of maintaining the power once the switch is closed and/or substantially removing power once the control decides to do so.
- a further means of communication between the lock and the outside world would be through a special sort of key.
- a key might connect by any of a variety of known means, such as galvanic, capacitive, inductive, radio frequency, or even acoustical or optical energy. It could provide power to the lock and/or the lock could provide power to it.
- the data communication could be only in one or the other direction, or it might be in both directions. A whole host of well known techniques are available for this.
- the keys might range from a simple self-contained object that appears to users to be essentially no different than a mechanical key, all the way to a kind of transponder relay station, like a portable telephone, that establishes communication between the lock and some remote external device.
- An intermediate form would be a kind of PC key, that would allow software with graphic and possibly other interaction capability.
- An inductor used by the lock, such as for operating the latching mechanism or as a sensor, might double as part of the non contact interface.
- Certain keys may have access to a large number of locks and/or locks which should only be opened by that key under exceptional circumstances such as with police functions. In such cases, it might be advantageous for the key to limit the kinds or number of uses that can be made of it, such as limits on count or frequency of use. Similarly, a key might also provide its own log.
- the data from the sensor could be sent m raw analog form, or it could be conditioned and/or transformed in analog fashion, and/or quantized and possibly encoded at the lock location and sent in a digital form.
- the sensor is believed to be located either in the rotating plug or in the fixed part that it rotates in.
- the actuator is similarly preferably in one or the other of these parts. It is believed preferable that they are located in the same part, thereby not requiring electrical signals to be communicated between the two parts and also allowing, in the manufacture, one part to be a simple mechanical part without electronics. If the two can be brought to the same part, then it is believed preferable that the other electronics and battery also be brought to that part for the same reasons.
- an "electronic key” can interface by a so called “non-contact” means, such as inductive or radio frequency
- this interface could also be used for fixed on-line connection.
- a lock in a door could communicate with things located in other parts of the building, by a contact-less transciever mounted near the lock but on and/or in the door jam. This would remove the need to interface through the hinges or over a cable that flexes when the door is opened or closed.
- the online connection could in general be bidirectional, or be limited to one or the other single directions.
- a lock that can talk but not listen online could allow other computers to keep the log information; one that can listen but not talk could receive requests for changes to the rule bases. Power might be supplied to varying degrees over such connections.
- a burglar alarm or other "smart building" system may benefit from learning the status of the lock; for instance, a burglar alarm may simply arm or unarm itself when the lock is locked or unlocked, respectively. If the lock stops talking, the alarm system can assume it has been attacked or the door forcibly opened. Also, when the door is locked, the lock might send signals that cause the alarm system to be engaged; and when it is unlocked, the system might also be disengaged.
- the sensor or actuator could be split across the boundary between the plug and fixed part of the lock.
- optical or magnetic sensors could be located in the fixed part, but recognize movement in the plug.
- the mechanical keys used could be standard keys also used in other locks that are purely mechanical. This is believed to be part of the appeal of at least some embodiments of the present invention, as people would be able to use keys they already have to operate new things, and would thus be able to cut down on the number of keys they need to carry. Other keys could, however, be specific to this type of lock.
- a one-time-use key, or limited-use key could be made out of less durable material than conventional keys. They would not need to be as complexly shaped, since the key profile could be simply formed. They might, for instance, be NC stamped out of plastic or aluminum sheet. Laser cutting would also be possible from a variety of flat material stock.
- a user-settable key is known in the lock art.
- One way to realize such a key within the present inventive concept would be a key that has pre-perforated and therefor frangible bitting elements, so that the user simply has to break off the right number of elements in each of several places to achieve the desired virtual bitting profile.
- Suitable fixtures or tools could be provided for this
- Another approach would be to use set screws or other moveable elements that come up through the key to the bitting area, thus they would be standing straight up when inserted into a conventional lock configuration They could have indicia for the rotational positions of the screws that would correspond to various bitting profile codes.
- Yet another approach would be detachable bitting elements, each having a different code, that could be attached to a key frame. Magnets could be detected by some sensors and could be attached and positioned by a variety of well known techniques.
- a mechanical key is one that does not include all the key information itself; at least part of the key information is supplied by the person operating the lock.
- the pattern of physical manipulation of a key in the keyway could impart key information from the person.
- the key could be inserted to varying depths, each communicating a digit of a "PIN" code.
- the digits could be recognized simply because of a delay introduced at each position to be communicated or a change of direction or attempt to rotate the lock could be used to indicate the digits.
- a simple key for this purpose might have no key information and have ten discrete steps on its bitting, with visible indicia along its side so that the operator could see the digit corresponding to each depth of insertion
- the steps on the bitting could be simply in increasing or decreasing sequence, or alternatively could have only a smaller number of depths arranged so that from each position the two adjacent positions are different, such techniques being well known in the shaft encoder and other similar arts
- dials could contain a part that fits into the keyway, and which preferably is retained in the keyway against some force, for user convenience and familiar feel.
- the dial part could communicate its position to the part in the keyway under a height sensor either by a rotating shaft or an element that is raised or lowered without rotating.
- the first type could simply be like a shaft encoder.
- the second could simply be cammed into a height by a camming surface on the inside of the dial that vanes with rotational position of the dial. In any case, pushing a knob in or otherwise changing its configuration should allow it to turn the plug for unlocking.
- a preferred alternate embodiment would allow any key-not an authorized key or special key-to be used to enter a PIN code.
- XYZ could be entered with any key, simply by attempted turning X times in a first rotational direction and then Y times in the other rotational direction, and Z in the first direction.
- Another approach would be to turn back and forth the number of times represented by the digit and to remove and re insert the key between digits. The turning of the key could for instance be measured by the sliding plate or a capacitive sensor array.
- a PIN code could be used to make the lock learn a key, thereby allowing the emailing of the PIN code to all the people who will need to begin using a particular lock possibly to the exclusion of some or all existing users.
- the lock may require an internal power source, which will be referred to as "power pack".
- the power pack could be implemented by one or more known batteries and possibly associated circuitry, or any other source of electrical power, including solar or other passive collector techniques, fuel cell, etc. If this power pack is such that it may require replacement or other maintenance during the anticipated lifetime of the lock, then a way should be provided to allow it to be removed and replaced.
- a closure or other fastening means that is easily operated but not accessible from the front of the lock.
- This will be referred to as a "back closure” and is said to be operable from the “back” of the lock.
- a simple snap in plastic cap in a drill hole in the back of a mortise or rim cylinder could hold a cylindrical battery in place; it could easily be pried loose, the battery replaced, and then re inserted.
- a front closure This means that there is a protective cap on the front face of the lock housing and/or plug (i.e. accessible from the same space as the keyway is accessible for insertion of the keys).
- This front cap might include sealing means to provide protection against contamination, such as dust or moisture.
- the front closure could simply be operated by anyone, such as if it were a threaded plug, like a set screw, that could be operated with a com or screwdriver, as are well known
- a front closure should not be easily operable by vandals who might disable or remove batteries and thus potentially render the lock inoperable. Another issue in some contexts is that the closure should not significantly impair the security of the lock against physical attack, including attacks that may wish to tamper with or even add mechanism.
- One way to prevent vandals, or others not in possession of a valid key, from operating the closure is to ensure that it can only be operated when the lock is in a special physical configuration. For example, only when the key is turned to a particular designated angle, thus giving reasonable assurance that the person(s) attempting to remove the front closure is in possession of a key that has successfully unlocked the lock.
- this can be achieved for example by an element, such as a ball, that is normally positioned at the interface between the body and cap, so as to prevent the cap from being able to be rotated and removed. But when the plug is in a certain rotational position, a recess in the plug comes into alignment with the ball, allowing it to be cammed by the cap out of the cap, thereby allowing the cap to be rotated and removed.
- a front closure that is operable when unlocked can be combined with a back closure.
- One reason would be that even if there is provision for power to be supplied by an I/O means, some users may only have metal keys and would thus be unable to open the lock and replace its battery. Where locksmiths or service personnel do battery replacement, and there is provision for external power, this problem may not occur.
- Another way to secure a front closure against tampering would be to use some kind of mechanical means operable from the back of the lock, "back operable" closure. This could be a special mechanism or it could be adapted to cooperate with the means traditionally used to hold lock cylinders in place.
- a so called “mortise” cylinder is threaded into the lock housing in such a way that it can be twisted out from the front; however, it is held from being able to rotate by a set screw, and this screw is only accessible along the edge of the door when it is open.
- This set screw could be adapted to cooperate in additionally retaining the front closure. Thus, loosening the set screw would provide space for the ball, so that the ball could be cammed out of the way of the cap.
- rim cylinders
- These are typically held in place by two or more screws that are operated from the back of the door.
- Mechanism could be adapted to cooperate with such a screw so that only when the screw was substantially unscrewed could the front closure be operable.
- one of the screws being back out would allow the ball to move out of the cap a leave its interface with the body free so that the cap could be unscrewed.
- a front closure could be arranged to be operable when either of two enabling means are actuated. For instance, one means might be that the lock is in a particular configuration, as described above, and another would be some kind of means not operable from the front of the lock, such as already described. In this example, even if the power pack is so low the lock cannot unlock, a screw not accessible from the front could be turned to allow the battery to be replaced.
- the ball element described for each might be able to move into two different places to free the cap: one becoming available when the plug is in a certain unlocked rotational position; the other becoming available when the retaining screw, whether in a mortise or rim type configuration, is backed out sufficiently.
- An embodiment with mechanical sensing of the bitting profile might automatically provide locking. But this is believed to depend on the particular key bitting pattern. If, on the one hand, the pattern keeps the sensor at its highest point during unlocking, then little retention is provided. If, on the other hand, the sensor is at a lowered position and the bitting immediately to the back of it is at a higher position, then the sensor could retain the key if it were held down.
- bails or other elements that ride up and down on the bitting profile at various distances into the lock, and that can be kept from raising while the lock is rotated outside of its home locked position.
- These could be held in bore holes and springs could push them down against the key, as in known "pin tumbler" locks. They could be held in place by a toothed member that is pushed horizontally into engagement with a ball; each tooth would correspond to a key bitting height range for the position of that ball.
- the toothed member could be urged into engagement with a bail by a cam action from the sidebar; it could be urged back into an u ⁇ -engaged position by a spring.
- the above approach relies on at least one of the bails engaging at a height that is lower than a height deeper on the key, and preferably near the ball. A key with a simple taper getting thinner towards away from the fob clearly has no such points.
- a different approach to key retention would be through a brake like mechanism, in which at least one brake “shoe” is pushed up against the side of the inserted key.
- the shoe is of a material that is preferably deformable and also preferably more sticky than slippery. Thus it engages the micro surface of the key, and could even engage macro features of the key, such as the bitting if it deforms far enough.
- a deformable member such as a helical spring, could urge the brake out of the way of the key when the lock is in the locked rotational position.
- the brake cam could, for instance, be simply a ball that is cammed into the plug when it is not over a recess in the body, and where that recess is positioned so that the cam is over it when the lock is in the unlocked position.
- a plastic ball bearing might be a good brake, as it could easily be pushed out of the way when in the unlocked position; a second ball could ride against the bore hole and enter a recess for the locked position. Two sets facing each other would reduce the amount of travel needed. Spring force applied to them could also act to keep the key centered during sensing motions. In case of multiple key pulls, there would be multiple recesses, one corresponding to each.
- the keyway slot can be extended out past the front plane of the lock, as with some automotive steering column locks, so that it can be turned with the fingers and a key can still be inserted into it.
- the protrusion might contain a key sensing switch, and provide for earlier detection of the key being inserted. It might also be made of a material with a shielding effect on energy measured by the sensors. And it might allow easier and smoother turning of the key, possibly eliminating the need for clamping the key during rotation. Moreover, for those configurations where no key is provided for, or other situations when a key is not present, the lock can easily be operated. NON-ROTATING VERSION
- no mechanical locking may be provided and sometimes the sensor system could be used simply to inform another device that a particular key has been inserted. Examples include when the presence of a valid key is simply logged, such as for the rounds of a night watchman, an elevator that stops on a particular floor, a machine that becomes operable, a gate that opens, or a burglar alarm system that is activated.
- the locking may be by a wholly separate system.
- the mechanism might allow standard electric door strikes to be operated, or an electronic catch to a mini-bar. In such cases, the mechanism need not be configured to rotate, or if it is, it may not need to be rotated to cause at least some desired results.
- various types of mechanical movement other than rotation such as axial movement, can be considered alternate embodiments not only for versions where motion is not required, but also for those where it is.
- Fig. 1 a detailed combination block and functional diagram of a preferred embodiment of the invention is shown (and a split version of it is shown in Fig. 2).
- the "k-sensor" 101 represents the position sensor that is varied responsive to the key profile as the key is moved longitudinally within the keyway, various possibilities for such sensors having been described already and preferred examples are to be described in more detail.
- the key sensor may, as in a preferred embodiment but not shown here for clarity, also serve a switching function that can power the lock up from a lower- or no-power state.
- Its output is shown as input to "a-to-d" 102, which is an analog to digital converter that samples at a sampling rate and resolution already described.
- the a-to-d 102 takes values of sensor 101 and transforms them into a quantized form, such analog to digital converters being well known in the micro-controller art.
- the quantized samples are then provided to the analysis means/step 103, which transforms them into a feature set as already described.
- the feature set is then compared by "lock logic" box 104 with one or more templates obtained from the rule base data storage element 105, such digital processing and storage means/methods being well known in the micro electronics art. If the feature set acceptably matches a template whose rule interpretation allows unlocking, the lock logic prepares to unlock.
- the optional "r sensor" 106 may be used to sense rotation of the lock or other motion preliminary to opening. If sensor 106 is used, its output may be fed through the a-to-d 102, as shown, or optionally this conversion may not be needed in the case of a discrete output of the sensor 106, such as a simple switch, in either case the sensor 106 output can be thought of as passing through some analysis step/means, shown for clarity as again analysis 103, which may simply provide temperature compensation, switching and multiplexing of this a-to-d output.
- the lock logic 104 uses the analyzed output of the rotational sensor 106, or the direct digital output of the sensor 106, to decide when to energize the actuator 107 that allows physical unlocking. (A variation allows the rotational sensor switch to interrupt the power to the actuator at all but some rotations.)
- the rotational sensor can, among other things, also be used to determine when the lock is in the locked rotational position and when it may be in other positions.
- the lock logic 104 determines what must be logged, and provides such data to the logging step/means 108.
- the log 108 and rule base 105 may each also be interrogated and/or modified by the lock logic 104, as already described.
- the lock logic 104 also optionally interacts with "i/o" means/steps 109, and thereby provides information to the user and/or external apparatus as well as for the purpose of obtaining information from such user or apparatus, all as already described.
- Power means 110 are shown without indicating explicit connections with the other blocks for clarity. For instance, some devices may require power directly, or may obtain it indirectly from other devices, and there may be plural power sources and/or reserves and various techniques for converting and regulating the power that may be required by various device technologies, all as is well known in the electronics art.
- the key sensor 101 may be a resistive plastic potentiometer, as are well known in the art, and described latter in a preferred embodiment.
- the digital to analog conversion 102, as well as analysis 103, lock logic 104, and storage means 105 and 108, are all well known in the digital micro-controller art.
- Actuator 107 might be a an adapted form of solenoid, holding magnet, dc motor, or integrated circuit actuator, for example, as are well known in the electromechanical art, and some of which are described in more detail with reference to preferred embodiments.
- the rotational sensor 106 may be as simple as an electrical switch or a potentiometer configured to sense position, as already described, or be a shaft encoder or one of a host of other rotational motion or position sensors known in the art.
- the input output means 109 might be simple galvanic contacts for well known serial communication, non-contact coupling, and may interface to humans by such means as optical, tactile or audio, all as are well known in the electronics art.
- the power source could be a lithium battery, for instance, or any other suitable source known in the art.
- a combination block and functional diagram depicts potential splits of the inventive apparatus and steps of Fig. 1 into two parts: a "remote part” located with the lock logic 104, analysis 103, rule bases 105, logging 106 and some potential input output means not shown for clarity; and the "lock part” located with the lock itself, including sensor 101 and actuator 107, as well as optional rotational sensors 106 and optional input/output facility 109.
- the interface 201 is itself split between the two parts.
- the analysis 103, lock logic 104, rule bases 105 and logging 106 would communicate, via links shown directly from lock logic 104 and to analysis 103, with interface means 201.
- Dashed box 202 shows a section of the interface located with the remote part; the remainder of ⁇ nterface201, apart from communications means not shown for clarity, is located with the lock part.
- the dashed box 203 indicates that in some embodiments analog to digital converter 102 will be located with the remote part (and thus boxes 202 and 203 are in those cases considered a single box); in other embodiments, the analog to digital converter 102 remains with the lock part.
- the converter 102 is with the remote part, then at least some analog signals flow across the interface; when it is with the lock part, at least some digital signals flow across the interface.
- certain embodiments may use a hybrid.
- An example would be a high-power analog signal that operates the actuator, with the sensor and i/o signals being low-power digital.
- Such various approaches to splitting devices between a central and remote part are well known, such as in the access control art.
- Fig. 3a is a front view perpendicular to the chip surface and Fig. 3b is the corresponding top view perpendicular to the chip surface.
- the silicon "chip” is divided for convenience into three areas: 301 is the magnet field detector for sensing key profile motion; 302 is all the digital processing, storage, and communication parts required by the lock, as already described in detail; and 303 contains the cantilevers for the micro actuator.
- Magnet 304 is what sensor 301 detects the motion of. It is shown as a bar perpendicular to the axis of key insertion. This is believed potentially preferable to a ball in this embodiment, since: it ensures that the magnet orientation does not change; can come closer to the chip than a ball; and might actually only be magnetic on the end near the chip, thereby reducing the potential for accumulation of magnetic particles in the keyway.
- Plate 305 is mounted so that it can slide a small distance from left to right in the diagram. One side of it slides over the cantilever area 303 and has the cavities formed in its hiden surface (as will be more apparent with reference to Fig. 5, which details one). The other side has slots through it, to be described later.
- Blade base 306 is also mounted so that it is free to travel along a line segment, but this segment is perpendicular to the line of travel of plate 305
- the blades 306a need not be sharp, but could be formed, as an example, from sheet metal molded into a metal base.
- the blades 306a are configured to be received by the cooperating slots 305a in plate 305, as shown. In the locked state, as can best be seen in Fig. 3b, the blades are at the end of their travel that does not penetrate the plate. When urged forward in unlocking by spring 316a, they attempt to penetrate the slots 305a.
- Fig. 4 exemplary embodiments are given of the cam action that drives the primary springs in Fig. 3 and also the sidebar not shown in Fig. 3.
- Fig. 4a and 4b show the smaller ball that cams the plate primary spring
- 4c shows the larger ball that cams the blade base primary spring
- 4d shows the sidebar. All four figures are sections perpendicular to the axis of the keyway showing both part of a lock body 401 and its plug 402.
- Fig. 4a and 4b show the small ball 403, preferably stainless steel, partly in the drill hole in the piug 402 and partly in the slot in the body 401
- the ball 403 is pushed towards the body by spring 315a.
- camming surface 401 a pushes ball 403 down into the drill hole in plug 402 as the plug 402 begins its first phase of rotation.
- Dimple 401 d (not called out in Fig. 4a but 4b for clarity) provides for ball 403 to move initially a small distance up, as it slips off dimple 401 d (because the plug is normally held in the twelve o'clock position by spring detents not shown for clarity) before being cammed down. This provides the slight motion in the reverse direction during unlocking that allows un jamming of cantilever parts as already mentioned.
- Fig. 4c shows the larger ball 404 being urged up toward the larger cord slot in body 401 by spring 316a. It will be appreciated that surface 401b does not engage ball 404 until the first rotational phase is over and a second phase begins, thereby allowing plate 305 to move first before the blades 306a contact it.
- Fig. 4d shows sidebar 405 and its spring 406, such sidebars and corresponding springs being well known in the lock art.
- the slot has the longest cord and thus phase two will be substantially over before phase three is begun by camming surface 401c engaging sidebar 405.
- This allows the blade base 306 to move out of the way of the sidebar 405 before the sidebar 405 attempts to move into the unlocking position, which it could not reach if the blade base 306 were not moved substantially.
- the blade base 306 would not be able to so move if the blades 306a could not penetrate the slots 305a in plate 305, which would result because at least some cantilevers restrained plate 305 against its being slid substantially by spring 315a.
- exemplary embodiments are shown of a single cantilever and matching cavity in four different configurations. They show the locked configuration, the plate moving in the locking direction camming a cantilever back into its retracted position, a retracted cantilever allowing unlocking, and a retracted cantilever that has no effect because it is not aligned with a cavity in a random arrangement
- Fig. 5a shows a cantilever 501a in the locked position, with the gap 501b etched or otherwise formed under the cantilever 501a.
- the part of the cantilever that protrudes above the surface of the silicon 303 is shown as 501c. It may be a separate deposit of material, or it may simply be part of the cantilever, with the surrounding surface of the silicon having been etched or otherwise brought down to a level below that of 501c.
- the protrusion 501c enters cavity 502a. It restrains plate 305 from sliding to the left, and thereby unlocking, by directly blocking business end 502b from being able to move through it.
- Fig. 5b shows the cantilever protrusion 501c in the process of being cammed downward by camming surface 502c of plate 305 as the plate 305 moves to the right and towards the locked position.
- Cantilever arm 501a is bent, much as it would be if it were in the process of being retracted.
- Fig. 5c shows the cantilever arm 501a in the fully retracted position, which brings the protrusion 501c out of the cavity 502a above it, ready for unlocking by the sliding of the plate 305 to the left.
- Fig. 5d shows the cantilever arm 501 a and protrusion 501 c fully retracted. But instead of a cavity above the protrusion 501c for it to lock into, part of the plate 502d is above. This means that even though this cantilever 501a has been retracted by the lock logic, it has no impact on unlocking because it cannot retain plate 305 in this relative positioning of the plate 305 and silicon 303.
- FIG. 6 shows an isometric view of an exemplary embodiment cutaway to expose, as will be appreciated, some of the main parts and their placement.
- Body 1 is the housing that provides support for many of the components and can be readily configured to fit into, for instance, mortise, rim and deadbolt types of door locks, as is well known in the art. For defimteness, but without loss of generality, it can be thought of as a brass cylinder about 1.25 inches in diameter and also about 1.25 inches deep. Its shape and function will be more fully described with reference to the other components it supports as they are described.
- Plug 2 is configured to be able to rotate freely within body 1. It can be seen also in isometric view in Fig. 9, and figures prominently in the sections of Figs. 7 and 8, which reveal other aspects as will be described. It has a keyway slot formed in it that could, for instance, as is well known in the art, be broached in a piece of turned brass.
- This slot visible in Fig. 1 is essentially as usual, except that it is without the common "warding" pattern that prevents all but certain key "profiles" from being able to be inserted. It thereby allows many types of keys to be used. For instance, a width of a tenth of an inch, height of about three eighths of an inch, and a depth of about an inch and a tenth is believed to allow many types of quality door lock keys to be inserted, as has been verified empirically.
- Slider 3 is configured to be able to move in a plane perpendicular to the axis of the plug 2 and is further constrained to move only within a radial line of the plug that also lies in the plane. It is shown as a preferably stainless steel plate of about forty thousandths of an inch thickness sliding within channels cut in the guide pins 1a, which are pressed into body 1, on each side of slider 3.
- the slider 3 is shown in this Fig. 1 at the bottom of its travel, i.e. closest to the plug, as also in Fig. 7a, in some intermediate heights in Fig. 7b and 8a, and in maximum height in Fig. 8b, all as will be described with reference to the respective figures. It supports sensor parts that move relative to fixed sensor parts, as will now be described.
- Board 4 is an electronics board, that also for economy is preferred to support fixed sensor parts, as will be described in detail particularly with reference to Fig. 10.
- the board 4 also includes, for instance, a chip and wire mounting, as will also be described with reference to Fig. 10.
- Board 4 is, although its wider part is hidden by the plate in the this Fig 1 but visible in Fig. 10, for economy and convenience, aligned by guide pins 1a, already mentioned, as indicated by the exemplary means of corner tracks cut longitudinally, visible in Fig. 6. It is held in position against these and at the bottom against the body by adhesive and/or deformable members not shown for clarity, thereby preferably avoiding forces on it, from mounting or temperature changes, that could cause it to crack and/or break any conductive paths it may contain.
- Latch 5a-b-c is shown in an example embodiment as a plunger 5a, latch ball 5b and solenoid body 5c. These can be seen also in locked isometric view in Fig. 9, for clarity without being called out explicitly.
- Fig. 8a and 8b show them in the locked and unlocked configuration respectively. The operation will be described later with reference to Figs. 8a and 8b.
- the solenoid body is held in position by body 1, and the plunger 5a is backed up by body 1 to resist being bent when force is applied by locking ball 5b.
- locking ball 5b is held partly by body 1, and partly by piug 2, so that it is constrained to travel only in a line radial to the center line of the keyway, as will be more clearly seen with reference to Figs 8a and 8b.
- Battery 6 is one of two symmetrically positioned cylindrical batteries, shown as examples of possible power sources. They are inserted in drill holes from the back of the body and wired, not shown for clarity, to the board 4 on wire pads 4c, to be described with reference to Fig. 10. Of course some embodiments receive power from outside and/or generate their own power. Also retrofitting to certain deadbolt configurations may require different battery placement/shapes, but batteries shapes can be adapted, as for instance it is believed that lithium batteries can be formed from thin sheets that can then be shaped
- Spring bars 18 are shown, the left one only at the slider 3 end and the right one only at the back end where it is held rigid against body 1 by set screw 18a. They are symmetrical and both extend from their respective clamping set screw 18a, through drill holes shown cutaway, all the way to rest on top of the slider 3. Spring bars 18 extend forward of the slider in some positions of the slider so that as it rises, and they retract as they are deformed, they still rest on the top of the slider 3. These spring bars 18 provide a downward force on the slider 3 that is in turn communicated to ball 3a (as will be described in detail with referrence to Figs 7 and 8) that rides on the inserted key and tracks its profile.
- the force should preferably be constant, and there are many possible spring configurations known in the art, but the force should be sufficient to provide good tracking and not too strong so as to make it too difficult to insert a key in; it is believed, based on empirical study, that the combined force of a few spring pins in a conventional lock cylinder may be suitable.
- Fig. 7 which has two parts 7a and 7b, each showing (a partly cutaway section with hiding those element not directly cut through) the lock through the already described center plane of slider 3.
- the first one, Fig. 7a shows the lock in locked position and without a key inserted, and thus with the slider 3 at its lowest position.
- the second cutaway, Fig. 7b shows a key having been inserted and, due to successful unlocking, the plug 2 rotated clockwise to roughly 1:30, with the slider fully pushed up.
- Key ball 3a rides on the key profile. Its size should be sufficiently small that it traces the profile adequately to read the key features. It is believed that a one eighth inch stainless steel ball bearing, as verified experimentally, would perform adequately. (Of course, as would be obvious, a pin or other shape could be used with some advantages in security of mounting.)
- the key ball 3a is at the bottom of its drill hole in the plug 2, as can be seen in Fig. 7a. The key ball 3a never leaves its linear travel in the drill hole in the plug 2 and the drill hole need not extend into the body. Even a key with the full height of the keyway only causes the ball to be between the top of the keyway and the boundary between body 1 and plug 2.
- Cam pins 2a are essentially hardened inserts intended to reduce wear and promote smooth turning of the plug when the slider 3 is at least partly down in the bore hole that the plug turns in. They might, for concreteness, be hardened stainless dowel pins of about one sixteenth inch diameter that are pressed into recesses milled axiaily along the side of plug 2, as can be seen in Fig. 9. In Fig. 7a they are partly supporting slider 3 as it is pressed down by spring 18 and also supported by key ball 3a, although exactly which supports the slider 3 in this configuration is believed unimportant to correct overall function.
- Fig. 7b the left cam pin 2a is shown in camming engagement with slider 3, as the key 20 is presumably being turned clockwise.
- the slider 3 is still in the slot in the piug and must be pressed up out of the plug so that the plug 3 can be rotated all the way around, as required by some lock configurations. If the key 20 raises the key ball 3a fully when the lock is being turned, as some keys do, then the key ball 3a holds plate 3 out of the plug, at least in the locked rotational position; but, as the plug 2 is turned, the slider 3 may still come down into the plug, and will require being cammed up by the cam p ⁇ ns2a.
- lock body 1 can be seen cutaway above the center for clarity; guide pins 1 a can be seen in center section for their whole length, spring bars 18 can be seen in section as they rest on the slide 3 Several not yet introduced elements will be described more fully elsewhere.
- a section of known key 20 can be seen in the keyway of Fig. 7b, as will be shown more fully in Fig. 8. The alignment pins 7b for holding part of the sensor to the plate 3 will be described more fully with reference to Fig. 9
- Fig. 8 which has two parts 8a and 8b, each showing (a partly cutaway section hiding those elements not directly cut through) the lock in a vertically oriented plane parallel with and through the axial center of the body 1 and the axial center of the plug 2.
- the first, Fig. 8a shows the lock in a locked state with an example key partly inserted.
- the second. Fig. 8b shows the key fully inserted and turned a quarter turn, top into the figure and behind the cut plane, and thus also showing the lock in an unlocked state.
- Cam plate 19 well known as but one example in the lock art, is shown for completeness as being attached to plug 2 by screws 19a, and being configured to allow rotation of the plug, but holding it from being pulled out of the body either accidentally or in an attempt to defeat the lock. It cooperates with the flange like widening at the front of plug 2 and matching recess formed in bodyl, both as can also be seen here, to prevent the plug from moving axiaily. It is what allows the assembly shown to operate the actual operator mechanism securing a door, as is well known in the lock art.
- Latch 5 can be seen in operation in Fig. 8, as already mentioned.
- Fig 8a shows the plunger 5a out of the solenoid body 5c and cooperating to retain latch ball 5b.
- the small recess shape in plunger 5a is intended to receive latch bail 5b during an attempt to force the lock by applying a high torque to the plug relative to the body, and thus the plunger is prevented from moving axiaily during such an attempt.
- the solenoid body 5c is energized with an electric current and urges the plunger 5a inwards which is leftwards in the figure.
- Fig. 8b When the plug 2 is then rotated a quarter turn, the configuration is as shown in Fig. 8b.
- the latch ball 5b has been cammed all the way out of the plug up into the cylindrical hole in body 1, in a manner widely known in the lock art for sidebars. It travels in a line radial with the plug and straight up into the guiding hole in the body left empty by the retracted plunger 5a.
- the bail When the lock is returned from the unlocked state to the locked state, the bail is urged down by springs (not shown for clarity) that also return the plunger to its fully extended position.
- Fig. 9 shown is an isometric view of a sub assembly including a key partly inserted.
- the slider 3, not called out for clarity, can be seen partly extending into the piug 2. It reveals along its top the block 7a to which the wipers 7 are attached and which is attached to the slider by guide pins 7b, as already mentioned with reference to Fig 7.
- Such a wiper set could be soldered, glued or (if it were wider than shown, pinned or riveted) onto the block 7a, which as already mentioned is located precisely on shder 3 by pins 7b. It is believed preferable, however, to electrically isolate wiper set 7 from the metal slider 3, so that there is no electrical connection between the outside world and the sensor electronics. Otherwise, the wiper assembly 7could be mounted directly onto the slider 3.
- the non conductive block serves this purpose. It could be formed (preferably molded) in such a way that the wipers snap in and are held in good alignment and that it contains the registration pins used to mount to holes in slider 3. It could be made from a "slippery" material, such as Teflon, and include parts that wipe on the tracks 4a and surrounding parts of board 4, preferably totally enclosing wiper 4a, so as to provide a kind of sealing action.
- cam pin 2a can be seen in its recess, as already mentioned with reference to Fig. 7. Also the slot cut, such as with a circular slitting saw, in plug 2 can also be seen in section in Fig. 8.
- FIG. 10 an isometric view of the board 4 and sensor mechanism are provided.
- the board 4 has an inverted "T" shape, owing to the need for the springs 18 to come down between the guide pins 1a when the slider is at the bottom of its travel.
- alternative spring arrangements notably those coming from the front of the guide pins, might be used if the board needed to be bigger in some embodiments, and still allow registration of the board 4 with the pins 1 a, as this is believed to provide inexpensive but good alignment of the sensor halves.
- Alignment pins oriented perpendicular to the axis of guide pins 1 a, pressed into it, and pointing straight backwards, would provide another way to align the board to the guide pins 1 a, instead of relying on mounting to the body 1, which is believed to reduce precision and increase the cost of that precision obtained
- the tracks 4a are depicted on the surface of the board 4 as recesses. This serves to show the extent and shape of the tracks, although whether they are raised, flush or below the surface of the board is not essential.
- the wider track shown at the left in the figure, would typically be a resistive material, such as so called resistive plastic used in high quality potentiometers. This could be molded, screened, formed from a co ⁇ tinuos tape, or otherwise applied.
- the narrower track, on the right in the figure, is the so called “return” track, that is a conductive material, such as a non corrosive but highly conductive precious metal or other suitable thin layer as are well known in the potentiometer art. Connection of such tracks by a sliding wiper is a well known technique in the potentiometer art that allows a tap to be moved continuously along a resistive path with fixed taps at both ends.
- Tracks 4a are not of equal length to indicate how at the lowest position of the slider 3 the electrical circuit is for all practical purposes fully open This allows the lock electronics to go into an ultra low power or zero power state and be woken up when current begins to flow since a key is inserted
- a capacitor could buffer the gaps in power that might occur during key insertion, in obvious manner.
- Connection pads 4c are shown for connecting the board to other electronic devices. Examples are the batteries 6, the latch solenoid 5c, and external input and/or output and/or power.
- Integrated circuit 4b is shown as mounted to the board. Of course, many other places and mountings for such circuits could readily be conceived, but this location could be used for SMD or chip on board, or whatever similar mounting technologies, and for whatever electrical components, all in known fashion.
- Board 4 could, as will be appreciated, and as is well known in the art, be made from glass fiber in an epoxy matrix with copper layers laminated to it and plate-through interconnects.
- connection of the tracks 4a, presumably including both ends of the resistive track, to the other electronics could be by means of conductive traces and/or plate-through holes.
- Wiper assembly 7 is shown without its mounting block, such block already described with reference to Fig. 9. Its actual wiper fingers can be seen positioned over the tracks 4a, which they are urged into contact with by the spring-like nature of their thin arms. The actual contact can be at the sharp end of the "V" shaped bends located near the ends of the fingers, as is well known in the potentiometer art.
- the material of the wiper assembly might, as an example, be formed of approximately five-thousandths of-an-inch thick sheet of a conductive and springy and non- easily-oxidized precious metal alloy, also is well known in the potentiometer art.
- Fig. 11a shows a section perpendicular to the keyway
- Fig. 11b show a section parallel with and through the keyway and from above
- Fig. 11c show a section parallel with and through the keyway from the side.
- Plates 1101a can be seen to be connected by leads 1101b to chip feet 1101c.
- the plates 1101a would be conductive and surrounded by, but insulated from, conductive guard rings, well known in the capacitive sensor art, not shown here for clarity, that are preferably connected to ground to improve the signal to noise ratio.
- Non-conductive layer 1102 insolates keys from the plates 1101a, which is preferably also of low dialectnc constant, tough enough to resist wear, and slippery so as to reduce wear and allow easy key insertion.
- Suitable material might include, for instance, teflon, nylon, polyethylene, polycarbonate, etc. While the layer 1102 is shown covering substantially three sides of the keyway, it may need cover only the plates 1101a.
- Chip 1103 is shown to resemble a standard type of integrated circuit package, but other packaging, such as chip on board, might serve as well
- the circuit detects capacitances in the picofarad or femtofarad range, preferably providing a digital output via a to d 102 as already described with reference to Fig. 1 and 2. Measurement of such capacitances are well known, and can be realized, for instance, by the Qprox products of Quantum Research Group, Victoria, United Kingdom Known in the art is the ability to multiplex the same circuit across multiple plates
- One technique believed well known in the art to provide more targeted sensing is to ground the plates adjacent to and near the one being read.
- Ground-plate 1104a is a preferably conductive and corrosion resistant element, such as a plate of stainless steel, that is mounted so as to be moveable into the keyway and towards plates 1101a, while remaining substantially parallel with them, and is urged in such direction by spring member 1104a, shown for clarity simply as helical compression springs 1104b.
- spring member 1104a shown for clarity simply as helical compression springs 1104b.
- Ground-plate 1104a is believed generally to reduce the variable gap between the key and the plates 1101a, as well as to provide a grounding of the key and back limit to the metal detection.
- Circuit board 1105 is simply a standard printed circuit board shown as an example non-conducive mounting medium well known in the art. Another known example is a flexible printed circuit board, possibly attached to other rigid components where needed, that could even connect all the electronics in the lock and be folded into place after fabrication.
- the leads 1101b already mentioned, could be so called vias and traces realized as conductive paths mechanically attached to board 1105. Also, the plates 1101 a could be copper laminated to board 1105, with boarder etched away and connected directly by vias.
- Back 1106 simply indicates the back end of the keyway, illustrating an exemplary rectangular shape of the keyway itself.
- Fig. 12 three exemplary alternate or additional capacitive plate arrangements are laid out. The first two are drawn as multiple strips, but a single strip version of them could be used. The third is depicted as a single strip, but could be used in higher multiplicity.
- the arrangement of Fig. 12a is intended for mounting along the top surface of the keyway, Fig. 12b shows longitudinal stripes for measuring depth of insertion and key warding patterns, and Fig. 12c indicates a generally applicable technique for obtaining definite position measurements.
- Fig. 12a has an exemplary array of equally shaped and spaced plates 1101a perpendicular to the direction of key insertion that are proportioned to suggest their placement along the top surface of the keyway. Thus they can each measure the distance down to a part of the bitting of the fully inserted key.
- a single plate 1101a could be used to read the distances as the key is inserted.
- Two such plates might give the general advantages of two sensors, as has been and will be mentioned further. If water were to enter the keyway, it might fall down, and away from these plates 1101a, particularly if the surface of non conductive layer 1102 is designed to reduce adherence of water.
- Mechanical means such as spring-loaded balls, not shown for clarity, could position the key either up to the plates, or preferably down to the bottom, to provide uniform readings and to ground the key.
- Fig. 12b positions plates 1101 a on the same surface as Fig. 11, but instead of perpendicular, they are parallel with the keyway. This means they can read the depth of key insertion.
- One of these plates 1 101 a might be sufficient for that function, and it could be in the space shown along the bottom of the plates in Fig. 11 c.
- Multiple plates 1101 a could provide improved signal to noise ratio and some might work better on some keys, depending on the warding pattern.
- Plural plates can also read information related to the warding (i.e. groves cut lengthwise on most keys). If one or a small number of plates 1101 a are used at the front according to the configuration of Fig. 11, then the warding pattern could still be read by an array of the type shown in this Fig. 12b that is positioned by itself further back in the keyway.
- Fig. 12c is configured for a key depth insertion type of reading, but could be used for all manner of measurements, not even limited to locks, as would be readily appreciated in the sensor art.
- the idea is essentially multiple plates connected to a single input to the electronics, to read the number and timing of plates that the target, in this case the key, comes near is read.
- capacitance will remain relatively constant and then increase with a step when the next plate is traversed. This provides definite insertion depth information.
- FIG. 13 an exemplary holding magnet alternate embodiment of an actuator is shown in section.
- Four operational configurations of the same device are shown: Fig. 13a locked, Fig. 13b at end of first unlocking phase, Fig. 13c at end of second unlocking phase, and Fig. 13d attempted unlocking without activation. All the views are sections along the same plane.
- Fig. 13a shows the latch plate 1301 in the retracted position, with four hook arms 1301 a. On one side is holding electromagnet 1302. On the other is permanent magnet 1303. The four sliders 1311, 1312, 1313, and 1314 can be seen all aligned to the left. As will be apparent, if the plate 1301 were to be moved up in an attempt to enter the second unlocking phase, then its hook arms would engage 1311 b and 1314b, and the plate would not be able to move the full distance into the unlocked position.
- Fig. 13b shows magnet 1303 having been moved to the right. This is accomplished by a camming action responsive to the partial initial turning of the lock as already described elsewhere.
- the electromagnet 1302 was energized during the separation, and this causes the slider 1312 and 1313 to remain held in contact with electromagnet 1302; the other two sliders stay with magnet 1303.
- the reason some stay with one surface and some with the other is that they are not as magnetic on one side as on the other, as is shown by the difference in color.
- these sliders would each be cut from two pieces of sheet metal, and joined in the middle, with one piece being much more magnetic than the other.
- the strongly magnet sides are 1311b, 1312a, 1213a, and 1314b; the weakly magnet sides are 1311 a, 1312b, 1213b, and 1314a.
- the strongly magnet sides are 1311b, 1312a, 1213a, and 1314b; the weakly magnet sides are 1311 a, 1312b, 1213b, and 1314a.
- Fig. 13c shows the position that the latch plate 1301 can reach when urged upwards after the other elements are at the end of a successful phase one unlocking.
- This motion would be supplied by a second phase camming force, as has already been described, and would allow the lock to be turned, possibly after being amplified by other mechanical means
- Fig. 13d shows the configuration if phase one motion is completed without activation of the electromagnet 1302. Since all the sliders are somewhat magnetic, they all stay with the magnet 1303 and none stay with electromagnet 1302. If the plate is attempted to be moved up, the hooks 1301 a will engage sliders 1312 and 1313, as can readily be seen, and this will prevent the plate from moving fully upward.
- Fig. 13 a-d One exemplary way to fabricate this inventive latch actuator shown in Fig. 13 a-d would use for the holding electromagnet 1302 a standard cylindrical design with an inner plug and outer casing, much like a solenoid with the plunger fixed in place against the inside back.
- the magnet 1303 would be simply a permanent magnet disc of the same diameter and aligned along the same longitudinal axis.
- the sliders 1311-14 would be sheet metal, as already mentioned. These would be oriented perpendicularly to the plane of the section shown. They would preferably be held by a Teflon cage not shown that allows them only to slide in the way shown in the diagram, that is from left to right between the two magnets 1302 and 1303.
- the latch plate 1301 would also be cut from sheet metal, but would lie in the plane of the section.
- FIG. 14 an exemplary alternate embodiment with two sensors is shown in vertical section through the keyway. Much as in Fig. 8a, except that the key reading stylus is duplicated.
- Stylus 3a 1 and 3a2 are introduced in this embodiment, to illustrate the notion of two dynamic mechanical sensors a small distance apart.
- the ball 3a is not present; the plates 3a 1 and 3a2 directly contact the key bitting profile. (They could be rounded or otherwise formed to reduce wear, not shown for clarity.)
- they each have separate springs and sensors so that they can each read the key underneath. Because key bittings have limited angles, the distance between the height of the two in normal use should consequently be limited. This is believed to imply that, for springs such as the flat ones in Fig. 15a-b, a small cutout in the plate closes to the spring ends would be sufficient for the spring to reach the front plate.
- One plate could thus have a middle spring and the other two-side springs.
- Fig. 15a and 15b an alternate embodiment of a plate that is able to move somewhat from side-to side and a leaf spring with attached piezoelectric sensor are shown, although one could be used without the other.
- the plate shown in section similar to that of Fig. 7a, has a cutout pattern that is intended to rise up more than a normal plate when the key gets wide, thereby giving a reading of the wide spots, which can, for instance, be used to encode a pattern specific to a particular key blank code series already mentioned, such as might be controlled by a locksmith.
- the leaf spring shown in section parallel with the keyway and looking upwards, replaces the wire spring 18 shown in Fig.
- Plate 1501 slides up and down in grooves in pin 1 a, as in previous embodiments, but is also shaped with rounded sides 1501 a to allow some twist while remaining in its plane.
- the spring 1503 rests on a rounded part 1501b with the same center as 1501 a that it is believed not to rise or fall much responsive to the twisting motion.
- the twisting motion is caused by the recess 1501 c at the bottom of plate 1501 that tracks the key bitting area as it may be inserted or move from side to side within the keyway.
- plate 1501 rises up because it does not fit in the deepest part of the recess 1501c; a straight cut plate, such as in Fig. 7a, does not rise up at this moment.
- the sensor system can detect the wide areas, and identify the key-blank series code.
- Spring 1503 is shown urging plate 1501 (or any other plate) downward, as it is attached at the opposite end, such as by fasteners 18a.
- a piezoelectric film transducer 1502 is attached to the spring surface, such as by an adhesive or lamination process. (An example is the "Piezo Film Sensors" by AMP, Valley Forge, Pennsylvania.) Shown also are two contacts, 1504. One is attached to the top one metal surface and the other is attached to the mostly hidden metal surface revealed by cutout 1502a. As the plate moves up and down, the sheet spring flexes and the piezoelectric effect creates signals that are fed to the a to d 102. Of course these signals are substantially proportional to changes in position and can be integrated to produce position measurements, by well known techniques. And calibration can be achieved when the lock is rotated, as the plate is moved to a known height.
- Fig. 16a shows a section perpendicular to the keyway
- Fig. 16b show a section parallel with the keyway, from above
- Fig. 16c show a section parallel with and through the keyway, from the side.
- Coil turns 1601a can be seen to be connected by taps 1601b to circuit board 1604.
- Non-conductive layer 1602 protects coil turns 1601 a from damage by key insertion, which is preferably tough enough to resist wear and slippery so as to reduce wear and allow easy key insertion.
- Suitable material might include, for instance, teflon, nylon, polyethylene, polycarbonate, etc. It is anticipated that the coil turns 1601a might be manufactured by a continuos process, either by being wound around a plastic sleeve or simply by being etched from a plating on a sleeve or foil to be folded into a sleeve form.
- Circuit board 1604 is simply a standard printed circuit board shown as an example non-conducive mounting medium well known in the art. Another known example is a flexible printed circuit board, possibly attached to other rigid components where needed, that could even connect all the electronics in the lock and be folded into place after fabrication.
- the leads 1601 b already mentioned, would be substantially electrically connected or coupled to conductive paths, not shown for clarity, on board 1604. Techniques for doing this, in the case of multiple coils, could for instance be adapted from those known related to connecting electrical signals to LCD displays.
- FIG. 16c shows mainly the protective layer 1602 lining the keyway and the substantially round cross sections of the many turns of the inductor 1601a.
- the embodiment of Fig 16 would involve in effect creation of one or more axiaily oriented coils, by taking multiple taps off the same coil, or by creating actual independent coils.
- the coils would be driven from a common AC source, such as in the 10Mhz range.
- Example values for other parameters might be about 10 turns of 50 gauge wire.
- a standard AC Wheatstone bridge could, for instance, be used to derive sensitive measurement of the difference in the AC inductance of two coils.
- This circuit could be multiplexed, by typical high-speed multiplex circuitry, so that various difference pairs could be read in rapid succession. These measurements could then be used to substantially cancel certain external noise.
- the result would is differences in the AC inductance of various axiaily spaced coils, thereby yielding information on difference, it is believed, of the approximate amount of air gap at the various cross-section points over time.
- FIG. 17 three views are shown of an alternative embodiment for AC inductance measurement.
- High permeability Ferrite elements 1701 and 1702 are shown, with 1701a and 1701b being inside the plug one either side of the keyway.
- Matching pieces of 1702a and 1702b, respectively, are shown being wound with inductive coils 1703a and 1703b, respectively.
- the mam plug material 1704 might be brass, from which the keyway slot 1704a is formed.
- the lock body in this case 1705 holds the various elements as shown.
- Fig. 18 two configurations of the same actuator and latch arrangement are shown in section, where in Fig 18a the latch is in the locked position and in Fig. 18b it is unlatched or open.
- the leaf spring elements 1814 normally would urge the sliding member 1801 so as to compress helical spring 1810 when the plug is rotated, not shown, while it slides between fixed parts 1803a and 1803b. This is because the body 1804 and attached springs 1814 would move vertically with relative to the remaining members, as can be seen in the difference between Fig. 18a and Fig. 18b.
- Plunger 1806 is guided along its axis of movement by being held by ⁇ eoprene sealing rings 1808a and 1808b, and its middle section moves between these seals in a bath 1809 of "Rheonetic Magnetic Fluid,” such as produced by Lord Corporation of Car ⁇ , North Carlolina. Normally, this fluid is in a hardened state because permanent horseshoe magnet 1805 causes enough magnetic flux to pass through it. When, however, magnetic coils 1813a and 1813b are energized, they counteract the field of the magnet and act to substantially cancel its effect on the fluid 1809, thereby making it possible for the plunger 1806 to slide essentially freely.
- plunger 1806 will meet substantial resistance from fluid 1809 and will not allow pivoting member 1802 to be pivoted to the position shown in Fig. 18b, and instead will cause leaf spring 1814 to be deformed and the lock jammed against rotation by slider 1801 continuing to protrude into the recess in body 1804 that it occupies in Fig. 18a.
- electromagnetic coils 1813a and 1813b are energized, and even briefly, the plunger 1806 will be pushed to the position shown in Fig. 18b, compressing spring 1811, and the sliding member 1801 will be pushed free of the cavity 1804 by the leaf springs 1814, and the lock will be able to operate.
- FIG 19 an exemplary optical sensor system is depicted in cross section perpendicular to the axis of the plug.
- the plug body 1905 is shown in section revealing the optional protective and slippery keyway lining 1906.
- Point light sources 1901 are arranged to alternately or in parallel provide light or infra-red energy or the like possibly in a modulated form into the one side of the keyway. This energy is then able to travel through the air gap in the keyway to the opposite side of the keyway and cast a shadow or shadows of the key onto the translucent member 1902.
- These images are then reflected by semi-spherical lens, the flat side of which is silvered, onto the detector array 1904. Although the detector 1904 may block part of the image, this can safely be ignored.
- one or more shadow grams move accross the screen 1902 and are observed by the camera and the key profile determined by known processing techniques.
- window 1902 would be transparent, and that light sources 1901 could be behind a translucent screen, though this is believed to be more subject to interference by wear and scratching of the window 1902.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US286980 | 1994-08-08 | ||
US09/286,980 US6318137B1 (en) | 1998-04-08 | 1999-04-06 | Electronic lock that can learn to recognize any ordinary key |
PCT/US2000/009039 WO2000060197A1 (en) | 1999-04-06 | 2000-04-05 | Electronic lock that can learn to recognize any ordinary key |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1165911A1 true EP1165911A1 (de) | 2002-01-02 |
Family
ID=23100960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00921722A Withdrawn EP1165911A1 (de) | 1999-04-06 | 2000-04-05 | Elektronisches schloss, das lernen kann, jeden gewöhnlichen schlüssel wiederzuerkennen |
Country Status (4)
Country | Link |
---|---|
US (2) | US6318137B1 (de) |
EP (1) | EP1165911A1 (de) |
AU (1) | AU4199900A (de) |
WO (1) | WO2000060197A1 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013178007A1 (zh) * | 2012-06-01 | 2013-12-05 | 杭州双华智能家居有限公司 | 智能锁智能钥匙及控制方法 |
Families Citing this family (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7821395B2 (en) * | 2001-12-27 | 2010-10-26 | Micro Enhanced Technology, Inc. | Vending machines with field-programmable locks |
US7373352B2 (en) | 2003-12-11 | 2008-05-13 | Triteq Lock And Security, Llc | Electronic key-control and management system for vending machines |
US6900720B2 (en) * | 2001-12-27 | 2005-05-31 | Micro Enhanced Technology, Inc. | Vending machines with field-programmable locks |
US6359547B1 (en) * | 1994-11-15 | 2002-03-19 | William D. Denison | Electronic access control device |
ATE246302T1 (de) * | 1998-12-16 | 2003-08-15 | Huf Huelsbeck & Fuerst Gmbh | Elektronischer schlüssel, insbesondere für kraftfahrzeuge |
EP1024239B1 (de) * | 1999-01-28 | 2005-03-23 | International Business Machines Corporation | Elektronisches Zugangskontrollsystem und Verfahren |
US6779310B2 (en) * | 1999-06-09 | 2004-08-24 | Steven Grover | Secure public storage lockers |
WO2002012985A2 (en) * | 2000-08-09 | 2002-02-14 | Datawipe Management Services Limited. | Personal data device and protection system and method for storing and protecting personal data |
HU223698B1 (hu) * | 2001-07-02 | 2004-12-28 | Vilmos Orczifalvi | Elektronikusan vezérelt hozzáférést biztosító berendezés és ehhez tartozó nyomáskódot tartalmazó kulcs |
US7725897B2 (en) * | 2004-11-24 | 2010-05-25 | Kabushiki Kaisha Toshiba | Systems and methods for performing real-time processing using multiple processors |
US20110276609A1 (en) | 2001-12-27 | 2011-11-10 | Denison William D | Method for Controlling and Recording the Security of an Enclosure |
US20050184857A1 (en) * | 2003-12-11 | 2005-08-25 | Triteq Lock And Security, Llc | Electronic security apparatus and method for monitoring mechanical keys and other items |
US7073708B2 (en) * | 2002-01-24 | 2006-07-11 | John H. Moorhouse | Optical security system |
US7108182B2 (en) * | 2002-01-24 | 2006-09-19 | John H. Moorhouse | Optical security system |
DK174939B1 (da) * | 2002-04-11 | 2004-03-08 | Ruko As | Elektro-mekanisk cylinder-lås-nøgle kombination med optisk kode og nøgle dertil |
US7215250B2 (en) * | 2002-11-22 | 2007-05-08 | Sensormatic Electronics Corporation | Proximity detaching for electronic article surveillance tags |
US7017959B2 (en) * | 2003-01-08 | 2006-03-28 | Selness Jerry N | Portable security device for doors |
CA2468072C (en) * | 2003-05-30 | 2008-02-26 | Hubert Hosselet | Electronic lock module |
US8876172B2 (en) * | 2004-03-05 | 2014-11-04 | Triteq Lock And Security, Llc | Vending machine lock with motor controlled slide-bar and hook mechanism and electronic access |
US20050193932A1 (en) * | 2004-03-05 | 2005-09-08 | Triteq Lock And Security, L.L.C. | Safe lock with motor controlled bolts and electronic access |
US20100194526A1 (en) * | 2004-07-22 | 2010-08-05 | Stanton Concepts Inc. | Tool Operated Combination Lock |
DE102004037587A1 (de) * | 2004-08-03 | 2006-02-23 | Enocean Gmbh | Energieautarkes elektronisches System |
SE0500975L (sv) * | 2005-04-29 | 2006-01-24 | Assa Ab | Elektromekanisk låsanordning |
SE527206C2 (sv) * | 2005-04-29 | 2006-01-17 | Assa Ab | Låsanordning samt sätt att montera en låsanordning |
US20070074471A1 (en) * | 2005-07-21 | 2007-04-05 | Gallagher Leo A | Hotel area for family reunions and the like |
US7520152B2 (en) * | 2005-09-13 | 2009-04-21 | Eaton Corporation | Lock device and system employing a door lock device |
EP1938504B1 (de) | 2005-10-21 | 2020-04-29 | Honeywell Limited | Autorisierungssystem und verfahren zur autorisierung |
US9101990B2 (en) | 2006-01-23 | 2015-08-11 | Hy-Ko Products | Key duplication machine |
EP1976656B1 (de) | 2006-01-23 | 2014-10-29 | Hy-Ko Products Company | Schlüsselverdoppelungsmaschine |
US7698917B2 (en) * | 2006-03-06 | 2010-04-20 | Handytrac Systems, Llc | Electronic deadbolt lock with a leverage handle |
PL1967477T3 (pl) * | 2007-03-09 | 2014-04-30 | Inventio Ag | Urządzenie awaryjne do wmontowania do kabiny windowej urządzenia windowego |
WO2008144803A1 (en) | 2007-05-28 | 2008-12-04 | Honeywell International Inc | Systems and methods for configuring access control devices |
CN101765995B (zh) | 2007-05-28 | 2012-11-14 | 霍尼韦尔国际公司 | 用于调试访问控制装置的系统和方法 |
DE102007000381A1 (de) * | 2007-07-17 | 2009-01-22 | Aug. Winkhaus Gmbh & Co. Kg | Elektronischer Sperrmechanismus |
US8085125B2 (en) * | 2007-09-08 | 2011-12-27 | Nima Bigdely-Shamlo | Method, apparatus, and system for an electronic key usage history indicator |
RU2470369C2 (ru) * | 2007-11-23 | 2012-12-20 | Инвенцио Аг | Замок-выключатель для встраивания в двужущееся устройство и способ эксплуатации замка-выключателя |
US8256254B2 (en) * | 2007-12-27 | 2012-09-04 | Utc Fire & Security Americas Corporation, Inc. | Lock portion with solid-state actuator |
US8047031B2 (en) * | 2007-12-27 | 2011-11-01 | Utc Fire & Security Americas Corporation, Inc. | Lock portion with piezo-electric actuator and anti-tamper circuit |
US20090205384A1 (en) * | 2008-02-18 | 2009-08-20 | Sandisk Il Ltd. | Electromechanical locking system |
US20090226050A1 (en) * | 2008-03-06 | 2009-09-10 | Hughes Michael L | System and apparatus for securing an item using a biometric lock |
DE102008018906B4 (de) * | 2008-04-14 | 2011-06-30 | ASTRA Gesellschaft für Asset Management mbH & Co. KG, 30890 | Schließzylinderanordnung |
EP2141663A2 (de) | 2008-06-30 | 2010-01-06 | Trell, Anders Edvard | Verfahren zur Authentifizierung mechanischer Schlüssel und damit verbundene Vorrichtungen |
US8314681B2 (en) * | 2008-09-18 | 2012-11-20 | Tyco Safety Products Canada Ltd. | System and method for automatic key recognition |
WO2010039598A2 (en) | 2008-09-30 | 2010-04-08 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
IT1397138B1 (it) | 2009-02-24 | 2013-01-04 | Rib Srl | Dispositivo selettore particolarmente per sistemi di chiusura automatici |
WO2010099575A1 (en) | 2009-03-04 | 2010-09-10 | Honeywell International Inc. | Systems and methods for managing video data |
WO2010106474A1 (en) * | 2009-03-19 | 2010-09-23 | Honeywell International Inc. | Systems and methods for managing access control devices |
US8644619B2 (en) | 2009-05-01 | 2014-02-04 | Hy-Ko Products Company | Key blank identification system with groove scanning |
EP2424690A4 (de) * | 2009-05-01 | 2013-11-27 | Hy Ko Products | Schlüsselrohlingsidentifikationssystem mit bartanalyse |
US8207852B2 (en) * | 2009-10-02 | 2012-06-26 | Sherrie Oehlert | Audible alert lock |
US9280365B2 (en) | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
US8707414B2 (en) | 2010-01-07 | 2014-04-22 | Honeywell International Inc. | Systems and methods for location aware access control management |
EP2354389B1 (de) * | 2010-01-15 | 2012-09-19 | iLoq Oy | Elektromechanisches Schloss |
US8787725B2 (en) | 2010-11-11 | 2014-07-22 | Honeywell International Inc. | Systems and methods for managing video data |
CN102003119B (zh) * | 2010-11-15 | 2013-05-08 | 唐名姣 | 一种安全锁及其钥匙 |
DE102011102140B4 (de) * | 2011-03-31 | 2013-08-08 | Burg-Wächter Kg | Schließzylinder für ein Schloss |
US9894261B2 (en) | 2011-06-24 | 2018-02-13 | Honeywell International Inc. | Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface |
US8890651B2 (en) * | 2011-07-20 | 2014-11-18 | Youtech, Inc. | Interchangeable lock core and opening method thereof |
US9051761B2 (en) | 2011-08-02 | 2015-06-09 | Kwikset Corporation | Manually driven electronic deadbolt assembly with fixed turnpiece |
US9344684B2 (en) | 2011-08-05 | 2016-05-17 | Honeywell International Inc. | Systems and methods configured to enable content sharing between client terminals of a digital video management system |
US10362273B2 (en) | 2011-08-05 | 2019-07-23 | Honeywell International Inc. | Systems and methods for managing video data |
US10038872B2 (en) | 2011-08-05 | 2018-07-31 | Honeywell International Inc. | Systems and methods for managing video data |
AU2013221600B2 (en) * | 2012-02-13 | 2016-09-29 | Xceedid Corporation | Credential management system |
US10465422B2 (en) | 2012-05-10 | 2019-11-05 | 2603701 Ontario Inc. | Electronic lock mechanism |
US9663972B2 (en) | 2012-05-10 | 2017-05-30 | Wesko Locks Ltd. | Method and system for operating an electronic lock |
US20140111329A1 (en) * | 2012-10-19 | 2014-04-24 | Gary M. Tearston | Use Privacy Indicator Method and Apparatus |
EP2935731B1 (de) * | 2012-12-23 | 2019-10-16 | Almotec B.V. | Zylinderschloss und schlüssel |
CA3146190C (en) | 2013-03-12 | 2024-04-30 | Spectrum Brands, Inc. | Electronic lockset with multi-source energy harvesting circuit |
CA2903811A1 (en) | 2013-03-15 | 2014-09-25 | Spectrum Brands, Inc. | Electro-mechanical locks with bezel turning function |
ITPN20130037A1 (it) * | 2013-07-02 | 2015-01-03 | Nilfisk Advance As | Macchina per la pulizia dei suoli con chiave perfezionata |
EP3019681B1 (de) * | 2013-07-12 | 2018-10-03 | InVue Security Products, Inc. | Warensicherheitsvorrichtungen zur verwendung mit einem elektronischen schlüssel |
US10523903B2 (en) | 2013-10-30 | 2019-12-31 | Honeywell International Inc. | Computer implemented systems frameworks and methods configured for enabling review of incident data |
US9422745B2 (en) * | 2014-05-09 | 2016-08-23 | Leslie Ho Leung Chow | Safe with nitinol wire locking mechanism |
US9784018B2 (en) * | 2014-07-21 | 2017-10-10 | Lantrn Limited | Luggage tracking device, systems and methods |
US9875586B2 (en) * | 2015-01-21 | 2018-01-23 | Texas Instruments Incorporated | Inductive coded lock system |
WO2017024043A1 (en) | 2015-08-03 | 2017-02-09 | Hy-Ko Products Company | High security key scanning system |
US10400475B2 (en) | 2015-12-01 | 2019-09-03 | Schlage Lock Company Llc | Systems and methods for key recognition |
US10415269B2 (en) | 2016-04-14 | 2019-09-17 | Schlage Lock Company Llc | Lock cylinder with electronic key recognition |
CA3020987A1 (en) | 2016-04-15 | 2017-10-19 | Mobile Tech, Inc. | Gateway-based anti-theft security system and method |
EP3363971B1 (de) * | 2017-02-16 | 2019-10-23 | iLOQ Oy | Elektromechanische sperre |
WO2018208932A1 (en) * | 2017-05-09 | 2018-11-15 | Caprino Carl | Restraint condition detection and notification system, devices, and methods |
US20190139343A1 (en) * | 2017-11-06 | 2019-05-09 | Wfe Technology Corp. | Electronic lock system, electronic lock device, and method for unlocking electronic lock device |
US11193306B2 (en) | 2019-02-08 | 2021-12-07 | Schlage Lock Company Llc | Electronic key reader for mechanical keys |
US11639617B1 (en) * | 2019-04-03 | 2023-05-02 | The Chamberlain Group Llc | Access control system and method |
US11454047B2 (en) | 2019-06-20 | 2022-09-27 | International Business Machines Corporation | Constructing physical keys by way of digital keys |
US10599825B1 (en) | 2019-07-18 | 2020-03-24 | Capital One Services, Llc | Authentication based on a physical key |
EP4062014A1 (de) * | 2019-11-20 | 2022-09-28 | UrbanAlps AG | Schlüssel mit einem mechanischen codierteil mit inneren hohlräumen, schloss für diesen schlüssel und verfahren zur herstellung dieses schlüssels mittels eines generativen fertigungsverfahrens |
NL2025438B1 (en) * | 2020-04-28 | 2021-04-06 | Nanjing Enwell Tech Service Co Ltd | Error-checking unlocking method and error-checking lock core |
FR3101366B1 (fr) * | 2020-04-28 | 2021-10-01 | Nanjing Enwell Tech Service Co Ltd | Méthode de déverrouillage anti-erreur et cylindre de serrure anti-erreur |
US12167174B2 (en) * | 2020-12-02 | 2024-12-10 | Charter Communications Operating, Llc | Methods and systems for automating hospitality workflows |
CN113256867B (zh) * | 2021-06-16 | 2022-07-29 | 佛山予恩科技有限公司 | 一种门禁设备mcu控制装置及其方法 |
CN113738195B (zh) * | 2021-10-22 | 2022-11-08 | 刘雄心 | 一种地铁屏蔽门电磁锁的电磁铁 |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3500326A (en) | 1965-08-17 | 1970-03-10 | Bowles Benford | Mechanically programmed encoder system |
US3639906A (en) | 1968-10-14 | 1972-02-01 | Peter R Tritsch | Key identification system having key code control |
US3782148A (en) | 1969-10-08 | 1974-01-01 | G Goldman | Electronic anti-theft locking system |
US3983724A (en) * | 1975-07-21 | 1976-10-05 | Master Lock Company | Changeable combination padlock |
US4250533A (en) * | 1979-05-21 | 1981-02-10 | Nelson Avi N | Security system |
US4453161A (en) * | 1980-02-15 | 1984-06-05 | Lemelson Jerome H | Switch activating system and method |
US4721956A (en) * | 1983-09-12 | 1988-01-26 | Demster Stanley J | Apparatus for converting key topography into electrical signals to effect key evaluation |
GB8517347D0 (en) * | 1985-07-09 | 1985-08-14 | Lowe & Fletcher Ltd | Operating security device & data carriers |
US4712398A (en) * | 1986-03-21 | 1987-12-15 | Emhart Industries, Inc. | Electronic locking system and key therefor |
GB2196685B (en) * | 1986-10-24 | 1990-10-24 | Yale Security Prod Ltd | Key-operable locks |
GB8627241D0 (en) * | 1986-11-14 | 1986-12-17 | Chubb Lips Nederland Bv | Identification token |
US4868559A (en) | 1987-10-02 | 1989-09-19 | Universal Photonix, Inc. | Security system employing optical key shape reader |
US5132661A (en) * | 1987-10-02 | 1992-07-21 | Universal Photonix, Inc. | Security system employing optical key shape reader |
US5337043A (en) * | 1989-04-27 | 1994-08-09 | Security People, Inc. | Access control system with mechanical keys which store data |
US5117097A (en) * | 1990-02-27 | 1992-05-26 | Kabushiki Kaisha Tokai Rika Denki Seisakusho | Key system for a vehicle |
US5745044A (en) * | 1990-05-11 | 1998-04-28 | Medeco Security Locks, Inc. | Electronic security system |
US5287098A (en) | 1991-02-11 | 1994-02-15 | Briggs & Stratton Corp. | Fail safe system for a mechanical lock and key set with electrical interlock |
US5176015A (en) * | 1991-04-10 | 1993-01-05 | Sussina Stan J | Restricted key system |
AT396282B (de) * | 1991-05-02 | 1993-07-26 | Grundmann Gmbh Geb | Schliesszylinder und schluessel |
US5193210A (en) * | 1991-07-29 | 1993-03-09 | Abc Auto Alarms, Inc. | Low power RF receiver |
US5552777A (en) * | 1992-02-14 | 1996-09-03 | Security People, Inc. | Mechanical/electronic lock and key |
US5543665A (en) | 1992-11-23 | 1996-08-06 | Demarco; Vincent | Optical key and lock code authentication |
DE69525425T2 (de) * | 1994-11-30 | 2002-10-10 | Texas Instruments Inc., Dallas | Schloss mit einem induktiven Suchgerät zur Schlüsselerfassung und Herstellungsverfahren |
US5691711A (en) | 1995-02-24 | 1997-11-25 | Jorgensen; Adam A. | Digital electronic key and lock system |
US6000609A (en) * | 1997-12-22 | 1999-12-14 | Security People, Inc. | Mechanical/electronic lock and key therefor |
US6031465A (en) * | 1998-04-16 | 2000-02-29 | Burgess; James P. | Keyless entry system for vehicles in particular |
-
1999
- 1999-04-06 US US09/286,980 patent/US6318137B1/en not_active Expired - Fee Related
-
2000
- 2000-04-05 WO PCT/US2000/009039 patent/WO2000060197A1/en not_active Application Discontinuation
- 2000-04-05 EP EP00921722A patent/EP1165911A1/de not_active Withdrawn
- 2000-04-05 AU AU41999/00A patent/AU4199900A/en not_active Abandoned
-
2001
- 2001-09-24 US US09/961,470 patent/US20030205070A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO0060197A1 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013178007A1 (zh) * | 2012-06-01 | 2013-12-05 | 杭州双华智能家居有限公司 | 智能锁智能钥匙及控制方法 |
Also Published As
Publication number | Publication date |
---|---|
US20030205070A1 (en) | 2003-11-06 |
US6318137B1 (en) | 2001-11-20 |
WO2000060197A1 (en) | 2000-10-12 |
AU4199900A (en) | 2000-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6318137B1 (en) | Electronic lock that can learn to recognize any ordinary key | |
CA1071769A (en) | Electronic combination lock and system | |
EP2172608B1 (de) | Verfahren zur Identifizierung von Schlüsseln zur Kontrolle von Schlössern | |
US10378244B2 (en) | Locking device with configurable electrical connector key and internal circuit board for electronic door locks | |
US6439009B1 (en) | Door with a lock and a plurality of doors with corresponding locks and a method of installation of a door with a lock | |
US3829833A (en) | Code element identification method and apparatus | |
CA1236200A (en) | Electronic lock and key system for hotels and the like | |
EP0388997A1 (de) | Elektronisches Verschlusssystem | |
US20180106073A1 (en) | Key monitoring door lock, door lock key monitoring system, and method thereof | |
EP0172215A1 (de) | Kontrolleinrichtung für verriegelung | |
CN201011953Y (zh) | 实体控管的文件柜设备 | |
JP4144853B2 (ja) | 開錠装置及びこれを用いた防犯システム | |
JPWO2008069210A1 (ja) | 鍵付保管庫 | |
JP4950253B2 (ja) | 鍵管理システム | |
US10337207B1 (en) | High security lock with multiple operational modes | |
RU10761U1 (ru) | Устройство для запирания помещений | |
Honey | Electronic access control | |
US11055939B2 (en) | Securing and/or locking system and corresponding method | |
EP0879334A2 (de) | Verschluss-system | |
RU2318968C1 (ru) | Устройство для ввода кода доступа в контроллер исполнительного механизма замка | |
JPH0996139A (ja) | 鍵形状読み取り装置 | |
JP2004257138A (ja) | ホログラムidキーシステム | |
RU47118U1 (ru) | Локальная система контроля и управления доступом в помещения на основе биометрической идентификации | |
RU57328U1 (ru) | Устройство для ввода кода доступа в исполнительный механизм замка | |
CN117765646A (zh) | 一种用于同步辐射光源的门禁联锁方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20010927 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17Q | First examination report despatched |
Effective date: 20040602 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20060912 |